slackbuilds_ponce/development/splint
2010-05-11 19:44:21 +02:00
..
doinst.sh development/splint: Initial import 2010-05-11 14:05:53 +02:00
README development/splint: Initial import 2010-05-11 14:05:53 +02:00
slack-desc development/splint: Updated for version 3.1.1 2010-05-11 19:44:21 +02:00
splint.info development/splint: Initial import 2010-05-11 14:05:53 +02:00
splint.SlackBuild development/splint: Updated for version 3.1.1 2010-05-11 19:44:21 +02:00

splint is a tool for statically checking C programs for security vulnerabilities
and programming mistakes. Splint does many of the traditional lint checks
including unused declarations, type inconsistencies, use before definition,
unreachable code, ignored return values, execution paths with no return,
likely infinite loops, and fall through cases.

More powerful checks are made possible by additional information given
in source code annotations.  Annotations are stylized comments that
document assumptions about functions, variables, parameters and types.
In addition to the checks specifically enabled by annotations, many
of the traditional lint checks are improved by exploiting this additional
information.

As more effort is put into annotating programs, better checking results.
Splint is designed to be flexible and allow programmers to select
appropriate points on the effort-benefit curve for particular projects.
As different checks are turned on and more information is given in code
annotations the number of bugs that can be detected increases dramatically.